Smart card

762 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
762
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
40
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Smart card

  1. 1. n LEVEL UNICODE – POSITION - CHARACTER- LENGTH CIPHER FOR SECURING SMART CARD Presented By S.SENTHIL KUMAR. K.NAVANEETHA KRISHNAN.
  2. 2. INTRODUCTION <ul><li>In day to day life, smart card plays an important role. </li></ul><ul><li>But due to the increase in hackers today, smart cards are becoming insecure now. </li></ul><ul><li>So it is time now to secure the smart card. </li></ul>
  3. 3. MY PREVIOUS PROPOSED MODEL
  4. 4. WORKING PRINCIPLE <ul><li>The input to the hash algorithm can be of any length. </li></ul><ul><li>But output will be only of fixed length. </li></ul><ul><li>Collision Resistance -it is rare that two messages (in our case, it is PIN) have the same hash value. </li></ul>
  5. 5. DISADVANTAGES OF SHA FAMILY <ul><li>SHA family algorithms are relatively slower. </li></ul><ul><li>The initial value chosen by this hash algorithm is not dynamic. </li></ul><ul><li>SHA family uses the Merkle-Damgard model , which leads to the length extension attack. </li></ul><ul><li>It uses the static retriever table </li></ul>
  6. 6. PROPOSED IMPREGNABLE CRYPTOSYSTEM <ul><li>The total characters used for encryption is 255. </li></ul><ul><li>Number of alternate keys are relatively higher. </li></ul><ul><li>UNICODE characters instead of English alphabets. </li></ul><ul><li>It uses the position value -> the relative frequency attack is being avoided. </li></ul>
  7. 7. <ul><li>Important key ->The DATE and TIME on which the user obtained the smart card. </li></ul><ul><li>PLAIN TEXT : DATE & TIME + PIN . </li></ul><ul><li>This algorithm will take less time for encryption and takes more time for hackers to decrypt. </li></ul>
  8. 8. ENCRYPTION
  9. 9. ENCRYPTION FORMULA <ul><li>Cipher text = (position value of the character + character value in UNICODE + Total length of the plain text) mod 256. </li></ul><ul><li>Find the median of the obtained cipher text and pad it at the end. </li></ul><ul><li>Find the base 64 value of the system’s DATE & TIME and it at first. </li></ul>
  10. 10. IMPLEMENTATING CIPHERS
  11. 12. DATABASE-2
  12. 13. COMPLEXITY ANALYSIS <ul><li>Number of alternate keys </li></ul><ul><li>= 2256 * 255! * 109 *2*3*4 * 62 </li></ul><ul><li> = 3.34 * 10593 keys.. </li></ul><ul><li>Number of keys that can be found in a day at 1 decryption/µs </li></ul><ul><li>= 24 * 60 * 60 * 106 </li></ul><ul><li> = 8.64 * 1010 keys decrypted/Day </li></ul>
  13. 14. <ul><li>Number of keys that can be found in a year at 1 decryption/µs </li></ul><ul><li>= 8.64 * 1010 * 365 </li></ul><ul><li> = 3.15 * 1013 keys decrypted/year </li></ul><ul><li>Number of years required to find the key at 1 decryption/µs </li></ul><ul><li>= 1.06 * 10580 years </li></ul>
  14. 15. DEPLOYING IN SMART CARD <ul><li>A Smart Card is a type of card capable of storing data. </li></ul><ul><li>Magnetic stripe writer ->to transfer the encrypted PIN into the ATM card. </li></ul><ul><li>magnetic stripe is read by physical contact and swiping past a reading head. </li></ul><ul><li>They may also contain an RFID tag, a transponder device and/or a microchip. </li></ul>
  15. 16. ATM MACHINE WITH THE CENTRAL DATABASE
  16. 17. ADVANTAGES OF OUR MODEL <ul><li>Some of the attacks avoided include </li></ul><ul><li>Active attack </li></ul><ul><li>Passive attack </li></ul><ul><li>Relative Frequency attack </li></ul><ul><li>Relative Frequency attack </li></ul><ul><li>Dictionary attack </li></ul><ul><li>Forgery attack </li></ul>
  17. 18. Conclusion <ul><li>Thus this cipher is used in the encryption algorithm, which gave high performance. </li></ul><ul><li>It is now highly easy to store the information like PIN in the smart card safely. </li></ul><ul><li>it avoids the forgery attack efficiently. </li></ul>
  18. 19. FUTURE ENHANCEMENTS <ul><li>The PIN management is presently done in single encryption and single decryption. </li></ul><ul><li>In future, it can be implemented in dual encryption and dual decryption. </li></ul>
  19. 20. Thanking you!!!

×